Amit Sahai

ORCID: 0000-0003-2216-9600
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Complexity and Algorithms in Graphs
  • Cryptographic Implementations and Security
  • Privacy-Preserving Technologies in Data
  • Chaos-based Image/Signal Encryption
  • Coding theory and cryptography
  • Internet Traffic Analysis and Secure E-voting
  • Security and Verification in Computing
  • Advanced Authentication Protocols Security
  • Blockchain Technology Applications and Security
  • Cryptography and Residue Arithmetic
  • Distributed systems and fault tolerance
  • Computability, Logic, AI Algorithms
  • graph theory and CDMA systems
  • Wireless Communication Security Techniques
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Logic, Reasoning, and Knowledge
  • Adversarial Robustness in Machine Learning
  • Algorithms and Data Compression
  • Cloud Data Security Solutions
  • Cooperative Communication and Network Coding
  • Quantum Computing Algorithms and Architecture
  • Geometric and Algebraic Topology
  • Access Control and Trust
  • Security in Wireless Sensor Networks

UCLA Health
2015-2024

University of California, Los Angeles
2014-2023

University of Southern California
2023

Rutgers Sexual and Reproductive Health and Rights
2023

UC San Diego Health System
2023

University of California, Berkeley
1996-2023

Weizmann Institute of Science
1999-2023

Princeton University
2000-2016

University of California System
2012-2015

Massachusetts Institute of Technology
1998-2002

As more sensitive data is shared and stored by third-party sites on the Internet, there will be a need to encrypt at these sites. One drawback of encrypting data, that it can selectively only coarse-grained level (i.e., giving another party your private key). We develop new cryptosystem for fine-grained sharing encrypted we call Key-Policy Attribute-Based Encryption (KP-ABE). In our cryptosystem, ciphertexts are labeled with sets attributes keys associated access structures control which...

10.1145/1180405.1180418 article EN 2006-10-30

In several distributed systems a user should only be able to access data if posses certain set of credentials or attributes. Currently, the method for enforcing such policies is employ trusted server store and mediate control. However, any storing compromised, then confidentiality will compromised. this paper we present system realizing complex control on encrypted that call ciphertext-policy attribute-based encryption. By using our techniques can kept confidential even storage untrusted;...

10.1109/sp.2007.11 article EN 2022 IEEE Symposium on Security and Privacy (SP) 2007-05-01

In this work, we study indistinguishability obfuscation and functional encryption for general circuits: Indistinguishability requires that given any two equivalent circuits C <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">0</sub> xmlns:xlink="http://www.w3.org/1999/xlink">1</sub> of similar size, the obfuscations should be computationally indistinguishable. encryption, cipher texts encrypt inputs x keys are issued C. Using key SK...

10.1109/focs.2013.13 article EN 2013-10-01

We construct an Attribute-Based Encryption (ABE) scheme that allows a user's private key to be expressed in terms of any access formula over attributes. Previous ABE schemes were limited expressing only monotonic structures. provide proof security for our based on the Decisional Bilinear Diffie-Hellman (BDH) assumption. Furthermore, performance new compares favorably with existing, less-expressive schemes.

10.1145/1315245.1315270 article EN 2007-10-28

We show how to securely realize any multi-party functionality in a universally composable way, regardless of the number corrupted participants. That is, we consider network with open communication and an adversary that can adaptively corrupt as many parties it wishes. In this setting, our protocols allow subset (with pairs being special case) desired their local inputs, be guaranteed security is preserved activity rest network. This implies under concurrent composition unbounded protocol...

10.1145/509907.509980 article EN 2002-05-19

We introduce a new technique, that we call punctured programs, to apply indistinguishability obfuscation towards cryptographic problems. use this technique carry out systematic study of the applicability variety goals. Along way, resolve 16-year-old open question Deniable Encryption, posed by Canetti, Dwork, Naor, and Ostrovsky in 1997: In deniable encryption, sender who is forced reveal an adversary both her message randomness she used for encrypting it should be able convincingly provide...

10.1145/2591796.2591825 article EN 2014-05-31

Informally, an obfuscator O is (efficient, probabilistic) “compiler” that takes as input a program (or circuit) P and produces new ( ) has the same functionality yet “unintelligible” in some sense. Obfuscators, if they exist, would have wide variety of cryptographic complexity-theoretic applications, ranging from software protection to homomorphic encryption analogues Rice's theorem. Most these applications are based on interpretation “unintelligibility” condition obfuscation meaning...

10.1145/2160158.2160159 article EN Journal of the ACM 2012-04-01

Article Free Access Share on Concurrent zero-knowledge Authors: Cynthia Dwork IBM Research Division, Almaden Center, 650 Harry Road, San Jose, CA CAView Profile , Moni Naor Dept. of Applied Mathematics and Computer Science, Weizmann Institute Rehovot 76100, Israel IsraelView Amit Sahai MIT Laboratory for 545 Technology Square, Cambridge, MA MAView Authors Info & Claims STOC '98: Proceedings the thirtieth annual ACM symposium Theory computingMay 1998Pages...

10.1145/276698.276853 article EN 1998-01-01

We present a general construction of zero-knowledge proof for an NP relation R(x,w) which only makes black-box use secure protocol related multi-partyfunctionality f. The latter is required to be against small number "honest but curious" players. As application, we can translate previous results on the efficiency multiparty computation domain zero-knowledge, improving over constructions efficient proofs. In particular, if verifying R witness length m done by circuit C size s, and assuming...

10.1145/1250790.1250794 article EN 2007-06-11
Coming Soon ...